* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download StMalloQuantumComputing
Bra–ket notation wikipedia , lookup
Topological quantum field theory wikipedia , lookup
Renormalization group wikipedia , lookup
Quantum dot cellular automaton wikipedia , lookup
Matter wave wikipedia , lookup
Scalar field theory wikipedia , lookup
Renormalization wikipedia , lookup
Wheeler's delayed choice experiment wikipedia , lookup
Wave–particle duality wikipedia , lookup
Quantum decoherence wikipedia , lookup
Particle in a box wikipedia , lookup
Quantum dot wikipedia , lookup
Relativistic quantum mechanics wikipedia , lookup
Hydrogen atom wikipedia , lookup
Quantum field theory wikipedia , lookup
Path integral formulation wikipedia , lookup
Measurement in quantum mechanics wikipedia , lookup
Coherent states wikipedia , lookup
Copenhagen interpretation wikipedia , lookup
Bell test experiments wikipedia , lookup
Density matrix wikipedia , lookup
Quantum fiction wikipedia , lookup
Double-slit experiment wikipedia , lookup
Theoretical and experimental justification for the Schrödinger equation wikipedia , lookup
Orchestrated objective reduction wikipedia , lookup
Quantum electrodynamics wikipedia , lookup
Bohr–Einstein debates wikipedia , lookup
Probability amplitude wikipedia , lookup
Many-worlds interpretation wikipedia , lookup
Delayed choice quantum eraser wikipedia , lookup
Quantum entanglement wikipedia , lookup
Quantum computing wikipedia , lookup
Symmetry in quantum mechanics wikipedia , lookup
Quantum machine learning wikipedia , lookup
Quantum group wikipedia , lookup
Bell's theorem wikipedia , lookup
History of quantum field theory wikipedia , lookup
Interpretations of quantum mechanics wikipedia , lookup
EPR paradox wikipedia , lookup
Canonical quantization wikipedia , lookup
Quantum state wikipedia , lookup
Hidden variable theory wikipedia , lookup
Quantum Computing and Quantum Parallelism Dan C. Marinescu and Gabriela M. Marinescu School of Computer Science University of Central Florida Orlando, Florida 32816, USA Acknowledgments The material presented is from the book Approaching Quantum Computing by Dan C. Marinescu and Gabriela M. Marinescu ISBN 013145224X, Prentice Hall, July 2004. Work supported by National Science Foundation grants MCB9527131, DBI0296107,ACI0296035, and EIA0296179. San Mallo, June 2004 2 Contents I. Computing and the Laws of Physics II. The Strange World of Quantum Mechanics III. Quantum Computing and Communication IV Hilbert Spaces and Tensor Products V. Qubits VI. Quantum Gates and Quantum Circuits VII. Quantum Parallelism VIII. Deutsch’s Problem IX. Bell States, Teleportation, and Dense Coding X. Summary San Mallo, June 2004 3 Technological limits – density and speed For the past two decades we have enjoyed Gordon Moore’s law the speed doubles every 18 months. But all good things may come to an end… We are limited in our ability to increase the density of solid-state circuits due to: power dissipation and quantum effects. the speed of a computing device due to: density San Mallo, June 2004 4 Technological limits – reliability Reliability will also be affected to increase the speed we need increasingly smaller circuits (light needs 1 ns to travel 30 cm in vacuum) smaller circuits systems consisting only of a few particles subject to Heissenberg’s uncertainty San Mallo, June 2004 5 Energy/operation If there is a minimum amount of energy dissipated to perform an elementary operation, then to increase the speed, thus the number of operations performed each second, we require at least a linear increase of the amount of energy dissipated by the device. The computer technology vintage year 2000 requires some 3 x 10-18 Joules per elementary operation. San Mallo, June 2004 6 The effect of increasing the speed upon the power consumption Assume that: the minimum amount of energy dissipated to perform an elementary operation is reduced 100-fold (this may not be technologically feasible) the speed of a solid state device is increased 1,000 fold Then we shall see a 10 (ten) fold increase in the amount of power needed by a solid state device operating at a 1,000 times higher speed. San Mallo, June 2004 7 Power dissipation, circuit density, and speed In 1992 Ralph Merkle from Xerox PARC calculated that a 1 GHz computer operating at room temperature, with 1018 gates packed in a volume of about 1 cm3 would dissipate 3 MW of power. A small city with 1,000 homes each using 3 KW would require the same amount of power; A 500 MW nuclear reactor could only power some 166 such circuits. San Mallo, June 2004 8 Heat generation… The heat produced by a super dense computing engine is proportional with the number of elementary computing circuits, thus, with the volume of the engine. If the devices are densely packed in a sphere of radius r the heat dissipated grows as the cube of the radius. San Mallo, June 2004 9 Heat removal If the devices are densely packed in a sphere of radius r, then the surface of the sphere is proportional with the square of the radius. To prevent the destruction of the engine we have to remove the heat through a surface surrounding the device. Our ability to remove heat increases as the square of the radius while the amount of heat increases with the cube of the radius of the computing device. San Mallo, June 2004 10 Energy consumption of a logic circuit E S Speed of individual logic gates Heat removal for a circuit with densely packed logic gates poses tremendous challenges. (b) (a) San Mallo, June 2004 11 Contents I. Computing and the Laws of Physics II. The Strange World of Quantum Mechanics III. Quantum Computing and Communication IV Hilbert Spaces and Tensor Products V. Qubits VI. Quantum Gates and Quantum Circuits VII. Quantum Parallelism VIII. Deutsch’s Problem IX. Bell States, Teleportation, and Dense Coding X. Summary San Mallo, June 2004 12 A happy marriage… Quantum computing and quantum information theory a product of a happy marriage between two of the greatest scientific achievements of the 20th century quantum mechanics stored program computers San Mallo, June 2004 13 Quantum Quantum Latin word meaning “some quantity”. In physics used with the same meaning as the word discrete in mathematics, i.e., some quantity or variable that can take only sharply defined values as opposed to a continuously varying quantity. The concepts continuum and continuous are known from geometry and calculus. San Mallo, June 2004 14 Quantum mechanics Quantum mechanics is a mathematical model of the physical world. Quantum properties such as uncertainty, interference, and entanglement do not have a correspondent in classical physics. San Mallo, June 2004 15 Heissenberg’s uncertainty principle The position and the momentum of a quantum particle cannot be determined with arbitrary precision. X PX h / 2 h=1.054 10-34 J second reduced Planck’s constant San Mallo, June 2004 16 Max Born’s Nobel prize lecture, Dec. 11, 1954 “... Quantum Mechanics shows that not only the determinism of classical physics must be abandoned, but also the naive concept of reality which looked upon atomic particles as if they were very small grains of sand. At every instant a grain of sand has a definite position and velocity. This is not the case with an electron. If the position is determined with increasing accuracy, the possibility of ascertaining its velocity becomes less and vice versa”. San Mallo, June 2004 17 Quantum theory and computing and communication Quantum theory Does not play only a supporting role by prescribing the limitations of physical systems used for computing and communication It provides a revolutionary rather than an evolutionary approach to computing and communication. San Mallo, June 2004 18 Milestones in quantum physics 1900 - Max Plank black body radiation theory; the foundation of quantum theory. 1905 - Albert Einstein the theory of the photoelectric effect. 1911 - Ernest Rutherford the planetary model of the atom. 1913 - Niels Bohr the quantum model of the hydrogen atom. 1923 - Louis de Broglie relates the momentum of a particle with the wavelength. 1925 - Werner Heisenberg the matrix quantum mechanics. San Mallo, June 2004 19 Milestones in quantum physics (cont’d) 1926 - Erwin Schrödinger Schrödinger’s equation for the dynamics of the wave function. 1926 - Erwin Schördinger and Paul Dirac show the equivalence of Heisenberg's matrix formulation and Dirac's algebraic one with Schrödinger's wave function. 1926 - Paul Dirac and, independently, Max Born, Werner Heisenberg, and Pascual Jordan obtain a complete formulation of quantum dynamics. 1926 - John von Newmann introduces Hilbert spaces to quantum mechanics. 1927 - Werner Heisenberg the uncertainty principle. San Mallo, June 2004 20 Milestones in computing and information theory 1936 - Alan Turing the Universal Turing Machine, UTM. 1936 - Alonzo Church ``every function which can be regarded as computable can be computed by an universal computing machine''. 1945 – J. Presper Eckert and John Macauly ENIAC, the world's first general purpose computer. 1946 - John von Neumann the von Neumann architecture. 1948 - Claude Shannon ``A Mathematical Theory of Communication’’. 1953 - UNIVAC I the first commercial computer,. San Mallo, June 2004 21 Milestones in quantum computing –the pioneers 1961 - Rolf Landauer computation is physical; studies heat generation. 1973 - Charles Bennet logical reversibility of computations. 1981 - Richard Feynman physical systems including quantum systems can be simulated exactly with quantum computers. 1982 - Peter Beniof develops quantum mechanical models of Turing machines. San Mallo, June 2004 22 Milestones in quantum computing 1984 - Charles Bennet and Gilles Brassard quantum cryptography. 1985 - David Deutsch reinterprets the Church-Turing conjecture. 1993 - Bennet, Brassard, Crepeau, Josza, Peres, Wooters quantum teleportation. 1994 - Peter Shor a clever algorithm for factoring large numbers. San Mallo, June 2004 23 Can we observe quantum effects with simple experimental setups? Experiments with light beams. Beam splitters and cascaded beam-splitters. Photon polarization and an experiment with polarization filters. Multiple measurements indifferent bases A photon coincidence experiment What do we notice Non-deterministic behavior Strange effects that cannot be explained using classical models of physics. San Mallo, June 2004 24 Can we construct a mathematical model to explain the results of the experiments? The model of photon behavior: non-deterministic captures superposition effects captures the effect of the measurement process superposition probability rule San Mallo, June 2004 25 Light Light a form of electromagnetic radiation. The electric and magnetic field oscillate in a plane perpendicular to the direction of propagation and are perpendicular to each other. The dual, wave and corpuscular, nature of light: Diffraction phenomena can only be explained assuming a wave-like behavior The photoelectric effect corpuscular/granular nature of light. The light consists of quantum particles called photons. San Mallo, June 2004 26 Beam splitters: deterministic versus probabilistic photon behavior Beam splitter a half silvered mirror. Part of an incident beam of light is transmitted and part is reflected. What happens when we send a single photon to a beam splitter? San Mallo, June 2004 27 D1 D3 Incident beam of light D5 Detector D1 D7 Reflected beam Beam splitter Transmitted beam Detector D2 D2 (a) (b) San Mallo, June 2004 28 A single beam splitter Either detector D1 or detector D2 will record the arrival of a photon How do we explain this behavior? probabilistic/genetic model? We repeat the experiment involving a single photon over and over again D1 and D2 record about the same number of events. Does a photon carry a gene? one with a “transmit” gene D2 one with a “reflect'' gene D1? San Mallo, June 2004 29 Cascaded beam splitters The experiment we send a single photon, repeat the experiment many times, and count the number of events registered by each detector. If the gene theory is true the photon is either reflected by the first beam splitter or transmitted by all of them. Only the first and last detectors in the chain are expected to register events (each one of them should register an equal number of events). The experiment shows all detectors have an equal chance to register an event. San Mallo, June 2004 30 The polarization of light Is given by the electric field vector Linearly polarized light the electric filed oscillates along any straight line in a plane perpendicular to the direction of propagation: Circularly polarized light the electric field vector moves along a circle in a plane perpendicular to the direction of propagation: vertical/horizontal polarization diagonal: 45/135 deg polarization Right-hand polarization counterclockwise rotation Left-hand polarization clockwise rotation Elliptically polarized light the electric field vector moves along an ellipse in a plane perpendicular to the direction of propagation. San Mallo, June 2004 31 An experiment with polarization analyzers/filters A polarization analyzer or polarized filter A partially transparent material that transmits light of a particular polarization. We perform an experiment involving: A source S of linearly polarized light of intensity I. A screen E where we measure the intensity of incoming beam of light. There types of polarization filters: A vertical polarization B horizontal polarization C a 45 degree polarization Each photon has a random orientation of the polarization vector. San Mallo, June 2004 32 The puzzling observations 1. 2. 3. 4. Without any filter the measured intensity is I. When we introduce a vertically polarized filter between the source and the screen the measured intensity is I/2. When we introduce a horizontally polarized filter between the vertically polarized filter and the screen the measured intensity is 0. When we introduce a 45 deg polarized filter between the vertically polarized filter and the horizontally polarized filter the measured intensity is I/8. San Mallo, June 2004 33 | 0 | 1 (a) E S S (b) (c) intensity = I A E B S intensity = I/2 A C B E S intensity = 0 (d) E A intensity = I/8 (e) San Mallo, June 2004 34 A mathematical model to describe the state of a quantum system 0 0 1 1 | 0 , 1 | are complex numbers | 0 | | 1 | 1 2 2 San Mallo, June 2004 35 Superposition and uncertainty In this model a state 0 1 0 1 is a superposition of two basis states, “0” and “1” or (Dirac’s notation) 0 and 1 This state is unknown before we make a measurement. After we perform a measurement the system is no longer in an uncertain state but it is in one of the two basis states: 2 | 0 | the probability of observing the outcome 1 2 | 1 | the probability of observing the outcome 0 | 0 | | 1 | 1 2 2 San Mallo, June 2004 36 The measurement of superposition states The polarization of a photon is described by a unit vector on a two-dimensional vector space with basis | 0 > and | 1>. Measuring the polarization is equivalent to projecting the random vector onto one of the two basis vectors. Thus after a measurement each photon is forced to choose between one of the two basis states. San Mallo, June 2004 37 Does the model explain the results? When filter A with vertical polarization is inserted between the source S and the screen E all photons are forced to choose between vertical and horizontal polarization. About half of them reach E because they choose vertical polarization the measured intensity is about I/2. When filter B with horizontal polarization is inserted between A and E then none of the incoming photons (all have horizontal polarization) reach E the measured intensity is 0. San Mallo, June 2004 38 A puzzling question Why when filter C with a 45 deg. polarization is inserted between A and B, the measured intensity is intensity is about I / 8? San Mallo, June 2004 39 Multiple measurements in different bases black hard white soft (a) (b) black hard white black soft white (c) San Mallo, June 2004 40 Measurements in multiple bases | > | | > | > 1 1 1 0 0 0 San Mallo, June 2004 | > 41 The answer to the puzzling question in the polarization filters experiment When we insert C, the 45 deg filter we force a measurement in a new base (45/135 degree). About half of the I/2 photons with vertical polarization (emerging from filter A) pass through filter B and exit with a 45 degree polarization. Then these I/4 photons are measured again in new basis (Vertical/Horizontal) and about half of them choose a horizontal polarization. They pass through filter B. Thus, the intensity of the measured light is now I/8. San Mallo, June 2004 42 The superposition probability rule If an event may occur in two or more indistinguishable ways For classical systems Bayes rules: P( B j | A) P( A | B j ) P( B j ) P( A | B ) P( B ) i i i In quantum mechanics the probability amplitude of the event is the sum of the probability amplitudes of each case considered separately (sometimes known as Feynman’s rule). An experiment illustrating the superposition probability rule. San Mallo, June 2004 43 Reflecting mirror U Source S1 Detector D1 direction1 BS1 BS2 direction2 Detector D2 Source S2 Reflecting mirror L (a) | 0 > (| t >) | 0 > (| t >) V V +q O (b) 1 1 |1> (| r >) +q +q |1> (| r >) -q direction1 San Mallo, June 2004 (c) direction2 44 The experiment We observe experimentally that a photon emitted by S1 is always detected by D1 and never by D2 and one emitted by S2 is always detected by D2 and never by D1. A photon emitted by one of the sources S1 or S2 may take one of four different paths shown on the next slide, depending whether it is transmitted, or reflected by each of the two beam splitters. San Mallo, June 2004 45 direction1 direction2 S1 S1 D1 BS1 BS2 T T +q D1 U BS1 +q BS2 R +q R +q (b) The RR case: the probability L amplitude is (+q)(+q). (a) - The TT case: the probability amplitude is (+q)(+q). S1 S1 R BS1 T U -q BS2 T BS1 R +q +q BS2 +q D2 L D2 (d) The RT case: the probability amplitude is (+q)(+q). (c) - The TR case: the probability amplitude is (+q)(-q). San Mallo, June 2004 46 A photon coincidence experiment One source emits two photons simultaneously into two separate beams. Each beam is directed by a reflecting mirror to one of two beam splitters. There are two detectors. We never observe a coincidence.. San Mallo, June 2004 47 Detector D1 Reflecting mirror U Beam splitter Source Reflecting mirror L Detector D2 San Mallo, June 2004 48 Contents I. Computing and the Laws of Physics II. The Strange World of Quantum Mechanics III. Quantum Computing and Communication IV Hilbert Spaces and Tensor Products V. Qubits VI. Quantum Gates and Quantum Circuits VII. Quantum Parallelism VIII. Deutsch’s Problem IX. Bell States, Teleportation, and Dense Coding X. Summary San Mallo, June 2004 49 The new frontier in computing and communication Applications of quantum computing and quantum information theory: Exact simulation of systems with a very large state space. Quantum algorithms based upon quantum parallelism. Quantum key distribution. San Mallo, June 2004 50 Frontier(s)…from Webster’s unabridged dictionary. The part of a settled or civilized country nearest to an unsettled or uncivilized region. Any new or incompletely investigated field of learning or thought. San Mallo, June 2004 51 What is a Quantum computer? A device that harnesses quantum physical phenomena such as entanglement and superposition. The laws of quantum mechanics differ radically from the laws of classical physics. The unit of information, the qubit can exist as a 0, or 1, or, simultaneously, as both 0 and 1. San Mallo, June 2004 52 Does quantum computing represent the frontiers of computing? Is it for real? Can we actually build quantum computers? - Very likely, but it will take some time…. If so, what would a quantum computer allow us to do that is either unfeasible or impractical with today’s most advanced systems? – Exact simulation of physical systems, among other things. Once we have quantum computers do we need new algorithms? – Yes, we need quantum algorithms. Is it so different from our current thinking that it requires a substantial change in the way we educate our students? – Yes, it does. San Mallo, June 2004 53 Quantum computers: now and then All we have at this time is a 7 qubit quantum computer able to compute the prime factors of a small integer, 15. To break a code with a key size of 1024 bits requires more than 3000 qubits and 108 quantum gates. San Mallo, June 2004 54 Approximate computer simulation of physical systems Eniac and the Manhattan project. The first programs to run, simulation of physical processes. Computer simulation – new approach to scientific discovery, complementing the two well established methods of science: experiment and theory. Approximate simulation – based upon a model that abstracts some properties of interest of a physical system. San Mallo, June 2004 55 Exact simulation of physical systems How far do we want to go at the microscopic level? Molecular, atomic, quantum? - All of the above. What about cosmic level? - Yes, of course. Is it important? - Yes (Feynman, 1981) . Who will benefit? – Natural sciences physics, chemistry, biology, astrophysics, cosmology,…. Applications nanotechnology, smart materials, drug design,… San Mallo, June 2004 56 Large problem state space From black hole thermodynamics – a system enclosed by a surface with area A has N(A) observable states with N ( A) e 3 Ac / 4 hG c = 3 x1010 cm/sec h = 1.054 x 10-34 Joules/second G = 6.672 x 10-8 cm3 g-1 sec-2 For an object with a radius of 1 Km N(A) = e80 San Mallo, June 2004 57 Quantum Parallelism In quantum systems the amount of parallelism increases exponentially with the size of the system, thus with the number of qubits. For example, a 21 qubit quantum computer is twice as powerfulas as a 20 qubit An exponential increase in the power of a quantum computer requires linear increase in the amount of matter and space needed to build the larger quantum computing engine. A quantum computer will enable us to solve problems with a very large state space. San Mallo, June 2004 58 Quantum key distribution To ensure confidentiality, data is often encrypted. We need for reliable methods for the distribution of the encryption keys. The problem physical difficulty to detect the presence of an intruder when communicating through a classical communication channel. San Mallo, June 2004 59 Quantum key distribution setup Alice and Bob connected via two communication channels: Alice sends photons via the quantum channel to Bob. A photon may be prepared with a classical one, and a quantum one. vertical/horizontal (VH) or diagonal polarization (DG). Alice and Bob also exchange messages over the classical channel. Eve eavesdrops on both communication channels. San Mallo, June 2004 60 Vertical Horizontal 45 deg Vertical/Horizontal (VH) 135 deg Diagonal (DG) (a) (b) Quantum communication channel Source of polarized photons Quantum wiretap Photon separation system Eve Classical wiretap Alice Classical communication channel Bob (c) San Mallo, June 2004 61 Information encoding A photon may be used to transmit information on a quantum communication channel. The classical binary information may be encoded as follows: We can use a photon with vertical/horizontal (VH) polarization 1 a photon with vertical polarization 0 a photon with a horizontal polarization. Alternatively we may use a photon with diagonal (DG) polarization 1 a photon with 45 deg. polarization, and 0 a photon with a 135 deg. polarization. San Mallo, June 2004 62 The measurements of photons sent over the quantum communication channel Bob uses a calcite crystal to separate photons with different polarization. The crystal is set up to separate vertically polarized photons from the horizontally polarized ones. To perform a measurement in the DG basis the crystal is oriented accordingly. Whenever Eve eavesdrops on the quantum communication channel she performs a measurement thus, she alters the state of the photons. San Mallo, June 2004 63 The quantum key distribution algorithm of Bennett and Brassard (BB84) Alice selects n, the approximate length of the encryption key. Alice generates two random strings a and b, each of length (4+ )n. By choosing sufficiently large Alice and Bob can ensure that the number of bits kept is close to 2n with a very high probability. A subset of length n of the bits in string a will be used as the encryption key and the bits in string b will be used by Alice to select the basis (VH) or (DG) for each photon sent to Bob. San Mallo, June 2004 64 BB84 (cont’d) Alice encodes the binary information in string a based upon the corresponding values of the bits in string b. For example, if the i-th bit of string b is 1 then Alice selects Vertical-Horizontal (VH) polarization. If VH is selected, then 0 then Alice selects Diagonal (DG) polarization. If DG is selected, then a 1 in the i-th position of string a is sent as a photon with vertical polarization (V), and a $0$ as a photon with horizontal (H) polarization; a 1 in the i-th position of string a is sent as a photon with a 45 deg. polarization, and a $0$ as a photon with 135 deg. polarization. Both Alice and Bob use the same encoding convention for each of the bases. San Mallo, June 2004 65 BB84 (cont’d) In turn, Bob picks up randomly (4+ )n bits to form a string b’. He uses one of the two basis for the measurement of each incoming photon in string a based upon the corresponding value of the bit in string b’. For example, a 1 in the i-th position of b’ implies that the i-th photon is measured in the DG basis, while a 0 requires that the photon is measured in the VH basis. As a result of this measurement Bob constructs the string a’. San Mallo, June 2004 66 BB84 (cont’d) Bob uses the classical communication channel to request the string b and Alice responds on the same channel with b. Then Bob sends Alice string b’ on the classical channel. Alice and Bob keep only those bits in the set {a, a’} for which the corresponding bits in the set {b, b’} are equal. Let us assume that Alice and Bob keep only 2n bits. San Mallo, June 2004 67 BB84 (cont’d) Alice and Bob perform several tests to determine the level of noise and eavesdropping on the channel. The set of 2n bits is split into two sub-sets of n bits each. One sub-set will be the check bits used to estimate the level of noise and eavesdropping, and The other consists of the {\it data} bits used for the quantum key. Alice selects n check bits at random and sends the positions and values of the selected bits over the classical channel to Bob. Then Alice and Bob compare the values of the check bits. If more than say t bits disagree then they abort and re-try the protocol. San Mallo, June 2004 68 Contents I. Computing and the Laws of Physics II. The Strange World of Quantum Mechanics III. Quantum Computing and Communication IV Hilbert Spaces and Tensor Products V. Qubits VI. Quantum Gates and Quantum Circuits VII. Quantum Parallelism VIII. Deutsch’s Problem IX. Bell States, Teleportation, and Dense Coding X. Summary San Mallo, June 2004 69 Hilbert space A vector space over the field of complex numbers with an inner product (a norm). In mathematics Hilbert spaces are infinite-dimensional. In quantum mechanics finite-dimensional Hilbert spaces. The basis vectors in a two-dimensional Hilbert space | 0> and |1>. four- dimensional Hilbert space | 00>, |01>, |10>, and |11>. eight-dimensional Hilbert space | 000>, |001>, |010>, |011>, |100>, |101>, |110>, |101>, and |111>. San Mallo, June 2004 70 The tensor product of two vectors in a twodimensional Hilbert space 0 0 1 1 0 0 1 1 0 0 0 0 0 1 1 1 1 0 1 1 San Mallo, June 2004 71 Two vectors in a four-dimensional Hilbert space 00 00 01 01 10 10 11 11 00 00 01 01 10 10 11 11 San Mallo, June 2004 72 The outer product of two vectors in a fourdimensional Hilbert space 00 01 00 10 11 00 00 01 00 10 00 11 00 00 01 01 01 10 01 11 01 01 00 10 0110 10 10 1110 San Mallo, June 2004 10 11 00 11 0111 00 11 1111 73 State space dimension of classical and quantum systems Individual state spaces of n particles combine quantum mechanically through the tensor product. If X and Y are vectors, then their tensor product X Y is also a vector, but its dimension is: dim(X) x dim(Y) while the vector product X x Y has dimension dim(X)+dim(Y). For example, if dim(X)= dim(Y)=10, then the tensor product of the two vectors has dimension 100 while the vector product has dimension 20. San Mallo, June 2004 74 Contents I. Computing and the Laws of Physics II. The Strange World of Quantum Mechanics III. Quantum Computing and Communication IV Hilbert Spaces and Tensor Products V. Qubits VI. Quantum Gates and Quantum Circuits VII. Quantum Parallelism VIII. Deutsch’s Problem IX. Bell States, Teleportation, and Dense Coding X. Summary San Mallo, June 2004 75 One qubit Mathematical abstraction Vector in a two dimensional complex vector space (Hilbert space) Dirac’s notation ket bra | column vector row vector bra dual vector (transpose and complex conjugate) San Mallo, June 2004 76 State description 0 0 V q0 = q 1 45o O q1 = q q0 1 1 O (a) V 30o 1 q1 (b) San Mallo, June 2004 77 |0> z |ψ r x y b |1> San Mallo, June 2004 78 A bit versus a qubit A bit Can be in two distinct states, 0 and 1 A measurement does not affect the state A qubit 0 0 1 1 can be in state | 0 or in state | 1 or in any other state that is a linear combination of the basis state When we measure the qubit we find it in state | 0 with probability in state | 1 with probability | 0 |2 | 1 | 2 San Mallo, June 2004 79 0 0 Superposition states 1 (a) One bit 1 Basis (logical) state 0 Basis (logical) state 1 (b) One qubit San Mallo, June 2004 80 Qubit measurement 0 p0 p1 1 Possible states of one qubit before the measurement The state of the qubit after the measurement San Mallo, June 2004 81 Two qubits Represented as vectors in a 2-dimensional Hilbert space with four basis vectors 00 , 01 , 10 , 11 When we measure a pair of qubits we decide that the system it is in one of four states 00 , 01 , 10 , 11 with probabilities | 00 | , | 01 | , | 10 | , | 11 | 2 San Mallo, June 2004 2 2 2 82 Two qubits 00 00 01 01 10 10 11 11 | 00 | | 01 | | 10 | | 11 | 1 2 2 2 San Mallo, June 2004 2 83 Measuring two qubits Before a measurement the state of the system consisting of two qubits is uncertain (it is given by the previous equation and the corresponding probabilities). After the measurement the state is certain, it is 00, 01, 10, or 11 like in the case of a classical two bit system. San Mallo, June 2004 84 Measuring two qubits (cont’d) What if we observe only the first qubit, what conclusions can we draw? We expect the system to be left in an uncertain sate, because we did not measure the second qubit that can still be in a continuum of states. The first qubit can be 0 with probability | 00 | | 01 | 1 with probability | 10 | | 11 | 2 2 2 2 San Mallo, June 2004 85 Measuring two qubits (cont’d) 0I Call measure I Call 1 measure I 0 the post-measurement state when we the first qubit and find it to be 0. the post-measurement state when we the first qubit and find it to be 1. 00 00 01 01 | 00 | | 01 | 2 2 I 1 San Mallo, June 2004 10 10 11 11 | 10 | | 11 | 2 2 86 Measuring two qubits (cont’d) II 0 0II Call measure II Call 1 measure the post-measurement state when we the second qubit and find it to be 0. the post-measurement state when we the second qubit and find it to be 1. 00 00 10 10 | 00 | | 10 | 2 2 II 1 San Mallo, June 2004 01 01 11 11 | 01 | | 11 | 2 2 87 Bell states - a special state of a pair of qubits If 1 00 11 2 and 01 10 0 When we measure the first qubit we get the post I measurement state I | 11 | 00 1 0 When we measure the second qubit we get the post mesutrement state II | 00 1II | 11 0 San Mallo, June 2004 88 This is an amazing result! The two measurements are correlated, once we measure the first qubit we get exactly the same result as when we measure the second one. The two qubits need not be physically constrained to be at the same location and yet, because of the strong coupling between them, measurements performed on the second one allow us to determine the state of the first. San Mallo, June 2004 89 Entanglement (Vërschrankung) Discovered by Schrödinger. An entangled pair is a single quantum system in a superposition of equally possible states. The entangled state contains no information about the individual particles, only that they are in opposite states. Einstein called entanglement “Spooky action at a distance". San Mallo, June 2004 90 Physical embodiment of a qubit The photon with tow independent polarizations, horizonatal and vertical. The electron with two independent spin values, +1/2 and -1/2. Quantum dots Small devices that contain a tiny droplet of free electrons. They are fabricated in semiconductor materials and have typical dimensions between nanometres to a few microns. The size and shape of these structures and therefore the number of electrons they contain, can be precisely controlled; a quantum dot can have anything from a single electron to a collection of several thousands. The binary information is encoded as the presence/absence of electrons. San Mallo, June 2004 91 Physical embodiment of a qubit (cont’d) A two-level atom in an optical cavity. Two internal states of an ion in a trap. Others San Mallo, June 2004 92 The spin In quantum mechanics the intrinsic angular moment, the spin, is quantized and the values it may take are multiples of the rationalized Planck constant. The spin of an atom or of a particle is characterized by the spin quantum number s. The spin quantum number s may assume integer and half-integer values. The spin is quantized for a given value of s the projection of the spin on any axis may assume 2s + 1 values ranging from - s to + s by unit steps. San Mallo, June 2004 93 More about the spin There are two classes of quantum particles fermions - spin one-half particles such as the electrons. The spin quantum numbers of fermions can be s=+1/2 and s=-1/2 bosons - spin one particles. The spin quantum numbers of bosons can be s=+1, s=0, and s=-1 San Mallo, June 2004 94 The Stern-Gerlach experiment with hydrogen atoms Screen N Source of hydrogen atoms S Magnet San Mallo, June 2004 95 The spin of the electron The electron has spin s = 1 /2 The spin projection can assume the values + ½ spin up, and -1/2 spin down. San Mallo, June 2004 96 Sz Rn(0) 1 h 2 - 1 h 2 Rn(180) (a) (b) San Mallo, June 2004 97 Communication with entangles particles Even when separated two entangled particles continue to interact with one another. Basic idea. Consider three particles Two particles (particle 2 and particle 3) in an anticorrelated state (spin up and spin down). We measure particle 1 and particle 2 and set them in an anticorrelated state. Then particle 1 ends up in the same state particle 3 was initially. San Mallo, June 2004 98 Initial state particle1 particle2 particle3 Entangle particle2 and particle3 Particle2 and particle3 in an anti-symmetric entangled state particle1 particle2 particle3 Separate the entangled particles New York particle1 London particle2 particle3 Entangle particle1 and particle2 Measure the entangled system (particle1, particle2) New York particle1 London particle2 San Mallo, June 2004 particle3 99 Contents I. Computing and the Laws of Physics II. The Strange World of Quantum Mechanics III. Quantum Computing and Communication IV Hilbert Spaces and Tensor Products V. Qubits VI. Quantum Gates and Quantum Circuits VII. Quantum Parallelism VIII. Deutsch’s Problem IX. Bell States, Teleportation, and Dense Coding X. Summary San Mallo, June 2004 100 Classical gates Implement Boolean functions. Are not reversible (invertible). We cannot recover the input knowing the output. This means that there is an irretrievable loss of information. San Mallo, June 2004 101 NOT gate x x 0 1 y 1 0 z = (x) AND (y) x 0 0 1 1 y 0 1 0 1 z 0 0 0 1 z = (x) NAND (y) x 0 0 1 1 y 0 1 0 1 z 1 1 z = (x) OR (y) x 0 0 1 1 y 0 1 0 1 z 0 1 1 1 z = (x) NOR (y) x 0 0 1 1 y 0 1 0 1 z 1 0 0 0 z = (x) XOR (y) x 0 0 1 1 y 0 1 0 1 z 0 1 1 0 y = NOT(x) x AND gate y x NAND gate y x OR gate y x NOR gate y x XOR gate y San Mallo, June 2004 1 0 102 One qubit gates Transform an input qubit into an output qubit Characterized by a 2 x 2 matrix with complex coefficients San Mallo, June 2004 103 0 0 1 1 G g11 g12 gate GOne-qubit g 21 g 22 0 g11 1 g 21 San Mallo, June 2004 0 1 ' 0 ' 1 g12 0 g 22 1 104 One qubit gates g11 G g 21 g12 g 22 g11 T G g12 * * g11g11 g 21g 21 G G * * g g g 22 g 21 12 11 g 21 g 22 * g11 G * g12 g g * 21 * 22 g g g g I g g g g * 11 12 * 12 12 San Mallo, June 2004 * 21 22 * 22 22 105 One qubit gates I identity gate; leaves a qubit unchanged. X or NOT gate transposes the components of an input qubit. Y gate. Z gate flips the sign of a qubit. H the Hadamard gate. San Mallo, June 2004 106 Identity transformation, Pauli matrices, Hadamard 1 0 0 I 0 1 0 0 1 1 0 1 1 X 1 0 1 0 0 1 i1 0 i0 1 0 i 2 Y i 0 0 0 1 1 1 0 3 Z 0 1 1 1 1 H 2 1 1 0 San Mallo, June 2004 0 1 2 1 0 1 2 107 Two-qubit gates 0 0 1 1 0 0 1 1 g11 g12 g13 g 22 g 23 g 21CNOT G g 31 g 32 g 33 g 41 g 42 g 43 g14 g 24 g 34 g 44 VCNOT San Mallo, June 2004 108 Tensor products and outer products 1 1 1 0 00 | 0 | 0 0 0 0 0 1 1 0 0 00 00 1 0 0 0 0 0 0 0 San Mallo, June 2004 0 0 0 0 0 0 0 0 0 0 0 0 109 The two input qubits of a two qubit gates 0 0 1 1 0 0 1 1 VCNOT 0 0 0 0 0 1 1 1 1 0 1 1 San Mallo, June 2004 110 A two qubit gate: CNOT Control input Target input Two inputs Control Target + O + O addition modulo 2 The control qubit transferred to the output as is. The target qubit Unaltered if the control qubit is 0 Flipped (0 1 and 1 0) if the control qubit is 1. San Mallo, June 2004 111 VCNOT GCNOT 1 0 0 0 WCNOT GCNOT VCNOT CNOT 0 1 0 0 0 0 0 1 0 0 1 0 San Mallo, June 2004 112 The transfer matrix of the CNOT gate GCNOT 00 00 01 01 10 11 11 10 GCNOT 1 0 0 0 0 1 0 0 San Mallo, June 2004 0 0 0 1 0 0 1 0 113 The transformation performed by CNOT gate WCNOT GCNOT VCNOT WCNOT 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 1 11 0 0 1 1 0 0 1 0 11 1 0 WCNOT 0 0 00 0 1 01 11 10 10 11 WCNOT 0 0 (0 0 1 1 ) 1 1 (1 0 0 1 ) San Mallo, June 2004 114 The output of CNOT gate CNOT preserves the control qubit the first and the second component of the input vector are replicated in the output vector. CNOT flips the target qubit the third and fourth component of the input vector become the fourth and respectively the third component of the output vector. WCNOT 0 0 (0 0 1 01 ) 1 1 (1 0 0 1 ) CNOT gate is reversible. The control qubit is replicated at the output and knowing it we can reconstruct the target input qubit. San Mallo, June 2004 115 Three qubit gates San Mallo, June 2004 116 The Fredkin gate Three input and three output qubits One control Two target When the control qubit is 0 the target qubits are replicated to the output 1 the target qubits are swapped San Mallo, June 2004 117 Three qubit gate a a a b a a' b b b a b b' 0 0 1 1 c c' a Input b c a' Output b' c' a Input b c a' Output b' c' a Input b c a' Output b' c' 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 1 0 0 1 00 0 1 1 1 0 1 0 1 0 0 1 0 1 0 0 1 0 0 1 0 1 0 1 1 1 0 0 1 0 0 1 1 0 1 1 0 1 1 1 1 1 1 1 0 1 0 0 1 1 0 1 0 0 1 0 1 1 1 0 1 1 0 1 0 1 1 1 1 1 1 1 1 (a) (b) (c) 0 bc 1 c b bc 0 c c c' c c' a=0 a’= bc & b’ = bc (d) a=1 & b=0 San Mallo, June 2004 (e) a’= c & b’ = c 118 The transformation performed by the Fredkin gate |000> |001> |010> |011> |100> |101> |110> |111> |000> |001> |010> |101> |100> |011> |111> |110> flip the two target qubits when the control qubit is 1 flip the two target qubits when the control qubit is 1 San Mallo, June 2004 119 The transfer matrix of the Fredkin gate GFredkin | 000 000 | | 001 001 | | 010 010 | | 011 101 | | 100 100 | | 101 011 | | 110 111 | | 111 110 | San Mallo, June 2004 120 The transfer matrix of the Fredkin gate GFredkin 1 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 San Mallo, June 2004 0 0 0 0 0 0 0 1 121 The Toffoli gate Three input and three output qubits Two control One target When both control qubit are 1 the target qubit is flipped otherwise the target qubit is not changed. San Mallo, June 2004 122 The transformation performed by the Toffoli gate |000> |001> |010> |011> |100> |101> |110> |111> |000> |001> |010> |001> |100> |101> |111> when both control qubits are 1 |110> then the target qubit is flipped San Mallo, June 2004 123 The transfer matrix of the Toffoli gate GToffoli | 000 000 | | 001 001 | | 010 010 | | 011 011 | | 100 100 | | 101 101 | | 110 111 | | 111 110 | San Mallo, June 2004 124 The transfer matrix of a Toffoli gate GToffoli 1 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 San Mallo, June 2004 0 0 0 0 0 0 1 0 125 Toffoli gate is universal. It may emulate an AND and a NOT gate a a a a 1 1 b b b b b b + ab c O 1 0 b c (a) NAND(ab) (b) San Mallo, June 2004 (c) 126 Controlled H gate H H (a) (b) San Mallo, June 2004 127 Generic one qubit controlled gate |c> |t> |c> U |t> A (a) B C (b) San Mallo, June 2004 128 |c0> |c0> |c1> |c1> |c2> |c2> |c3> |c3> |c4> |c4> |c5> |c5> | w0>=| 0 > | 0> | w1>=| 0 > | 0> | w2>=| 0 > | 0> | w3>=| 0 > | 0> | w4>=| 0 > | 0> C o n t r o l Target |t> U San Mallo, June 2004 129 Contents I. Computing and the Laws of Physics II. The Strange World of Quantum Mechanics III. Quantum Computing and Communication IV Hilbert Spaces and Tensor Products V. Qubits VI. Quantum Gates and Quantum Circuits VII. Quantum Parallelism VIII. Deutsch’s Problem IX. Bell States, Teleportation, and Dense Coding X. Summary San Mallo, June 2004 130 Problem formulation Consider a circuit to compute f(x). We wish to compute the values of f(x) for the 2n values of x using x is a binary n-tuple there are 2n possible values of x. a gate array is used to compute f(x) in one time step a classical circuit a quantum circuit Classical system Sequential computation using a single gate array we need 2n time steps Parallel computation using 2n gate arrays we need a single time step San Mallo, June 2004 131 Problem formulation (cont’d) Consider first the case n=1, x takes only two values x=0 x=1 We’ll show that the output of a quantum circuit is a superposition of f(0) and f(1) Both values, f(0) and f(1) are available But…..once we measure the output of the quantum circuit we can obtain only one of them San Mallo, June 2004 132 0 f(0) 1 0 f(0) 1 f(1) f(1) 2T (a) T (b) |x> |x> Uf |y> | y > O+ f(x) > T (c) San Mallo, June 2004 133 A quantum circuit to compute f(x) Given a function f(x) we can construct a reversible quantum circuit consisting of Fredking gates only, capable of transforming two qubits as follows |x> |x> Uf |y> | y o+ f(x )> The function f(x) is hardwired in the circuit San Mallo, June 2004 134 A quantum circuit to compute f(x) (cont’d) If the second input is zero then the transformation done by the circuit is |x> |x> Uf | f(x )> |0> San Mallo, June 2004 135 A quantum circuit (cont’d) We apply the first qubit through a Hadamad gate. 0 1 |0> 2 H |0> Uf |0> 0 f (0) 1 f (1) 2 The resulting sate of the circuit is 0 1 0 f( ) 2 The output state contains information about f(0) and f(1). San Mallo, June 2004 136 |x> |x> |x> Uf |y> Uf | y O+ f(x) > (a) |0> |x> |0> | f(x) > (b) H Uf |0> (c) San Mallo, June 2004 137 Quantum parallelism The output of the quantum circuit contains information about both f(0) and f(1). This property of quantum circuits is called quantum parallelism. Quantum parallelism allows us to construct the entire truth table of a quantum gate array having 2n entries at once. We start with n qubits, each in state |0> and we apply a Walsh-Hadamard transformation. San Mallo, June 2004 138 |x> (m-dimensional) |y> (k-dimensional) |x> Uf | y O+ f(x) > (n=m+k)-dimensional) San Mallo, June 2004 139 H0 0 1 2 ( H H H ) 000 Uf ( 1 2n 2 n 1 x,0 ) x 0 1 2n 1 2 1 n 2 n [( 0 1 ) ( 0 1 ) ( 0 1 )] 2 n 1 x x 0 2 n 1 U x 0 f ( x,0 ) San Mallo, June 2004 1 2 n 1 2n x 0 x, f ( x ) ) 140 Contents I. Computing and the Laws of Physics II. The Strange World of Quantum Mechanics III. Quantum Computing and Communication IV Hilbert Spaces and Tensor Products V. Qubits VI. Quantum Gates and Quantum Circuits VII. Quantum Parallelism VIII. Deutsch’s Problem IX. Bell States, Teleportation, and Dense Coding X. Summary San Mallo, June 2004 141 Deutsch’s problem Consider a black box characterized by a transfer function that maps a single input bit x into an output, f(x). It takes the same amount of time, T, to carry out each of the four possible mappings performed by the transfer function f(x) of the black box: f(0) = 0 f(0) = 1 f(1) = 0 f(1) = 1 The problem posed is to distinguish if f ( 0) f (1) f ( 0) f (1) San Mallo, June 2004 142 0 f(0) 1 0 f(0) 1 f(1) f(1) 2T (a) T (b) |x> |x> Uf |y> | y > O+ f(x) > T (c) San Mallo, June 2004 143 A quantum circuit to solve Deutsch’s problem |0> H |x> |x> H Uf |1> H 0 |y> 1 | y > +O f(x) 2 San Mallo, June 2004 3 144 0 1 0 1 0 0 1 0 1 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 G1 H H 2 1 1 2 1 1 2 1 1 1 1 1 1 1 1 1 1 1 1 0 1 1 1 1 1 1 1 1 1 1 G1 0 2 1 1 1 1 0 2 1 1 1 1 1 0 1 0 1 0 1 1 1 ( 00 01 10 11 ) 2 2 2 x 0 1 2 y 0 1 2 San Mallo, June 2004 145 y f ( x) 0 1 2 f ( x) 0 f ( x) 1 f ( x) y f ( x) (1) 2 f ( x) f ( x) 1 f ( x) 2 0 1 0 1 2 y f ( x) 0 1 2 2 if f ( x) 0 if f ( x) 1 San Mallo, June 2004 146 x y 0 1 1 0 1 0 1 1 1 2 2 2 1 2 1 2 x ( y f ( x)) 1 0 1 0 1 1 1 1 2 2 2 1 1 0 1 0 1 1 1 2 2 2 1 1 2 x ( y f ( x)) 1 0 1 0 1 1 1 1 2 2 2 1 San Mallo, June 2004 2 0 1 if f (0) f (1) 0 if f (0) f (1) 1 if f (0) 0, f (1) 1 if f (0) 1, f (1) 0 147 2 1 1 1 if 2 1 1 x ( y f ( x)) 1 1 1 if 2 1 1 San Mallo, June 2004 f (0) f (1) f (0) f (1) 148 1 1 1 1 1 0 1 0 G3 H I 2 1 1 0 1 2 1 0 3 G3 2 1 1 0 2 1 0 1 1 0 2 1 0 0 1 0 1 0 1 0 1 0 1 1 1 1 1 0 2 1 0 1 1 1 0 1 0 1 1 1 1 0 2 1 0 1 1 1 0 0 1 0 1 0 1 0 1 0 1 0 1 1 0 1 1 1 0 2 0 2 0 0 0 1 1 0 1 2 1 2 1 San Mallo, June 2004 if f (0) f (1) if f (0) f (1) 149 Evrika!! By measuring the first output qubit qubit we are able to determine f (0) f (1) performing a single evaluation. 3 f (0) f (1) 0 if f (0) f (1) 1 if 0 1 2 f (0) f (1) f (0) f (1) San Mallo, June 2004 150 Contents I. Computing and the Laws of Physics II. The Strange World of Quantum Mechanics III. Quantum Computing and Communication IV Hilbert Spaces and Tensor Products V. Qubits VI. Quantum Gates and Quantum Circuits VII. Quantum Parallelism VIII. Deutsch’s Problem IX. Bell States, Teleportation, and Dense Coding X. Summary San Mallo, June 2004 151 Quantum circuit to create Bell states stage 1 |a> |a> H H stage 2 |a’> |V> |b> |b> I (a) |W> |b’> (b) San Mallo, June 2004 152 Pair of entangled qubits particle 1 particle 2 particle 3 Caroll Bob Alice particle 1 particle 2 particle 3 Quantum Channel CNOT particle 1 - target qubit particle 3 - control qubit The measurement on the pair (1&3) changes the state of particle 2 to one of four states: S1, S2, S3, S4 iY Receive from Alice results of measurements 00 01 10 11 Measurement particle 3 - measured particle 1 - unchanged I Send to Bob results of measurement 00 01 10 11 X Z Z Classical Channel Particle 2 is in the same state as particle 3 San Mallo, June 2004 153 Pair of entangled qubits Alice’s qubit Bob’s qubit Caroll Bob’s qubit Alice’s qubit I Z X 00 01 10 iY 11 Alice’s modified but still entangled qubit Quantum channel Qubit from Alice Alice CNOT First qubit Second qubit 0 H 0 1 1 Bob San Mallo, June 2004 154 Contents I. Computing and the Laws of Physics II. The Strange World of Quantum Mechanics III. Quantum Computing and Communication IV Hilbert Spaces and Tensor Products V. Qubits VI. Quantum Gates and Quantum Circuits VII. Quantum Parallelism VIII. Deutsch’s Problem IX. Bell States, Teleportation, and Dense Coding X. Summary San Mallo, June 2004 155 Final remarks The growing interest in quantum computing and quantum information theory is motivated by the incredible impact this discipline could have on how we store, process, and transmit data. A tremendous progress has been made in the area of quantum computing and quantum information theory during the past decade. Thousands of research papers, a few solid reference books, and many popular-science books have been published in recent years in this area. San Mallo, June 2004 156 Final remarks (cont’d) Computer and communication systems using quantum effects have remarkable properties. Quantum computers enable efficient simulation of the most complex physical systems we can envision. Quantum algorithms allow efficient factoring of large integers with applications to cryptography. Quantum search algorithms speedup considerably the process of identifying patterns in apparently random data. We can guarantee the security of our quantum communication systems because eavesdropping on a quantum communication channel can always be detected. San Mallo, June 2004 157 Final remarks (cont’d) It is true that we are years, possibly decades away from actually building a quantum computer requiring little if any power at all, filling up the space of a grain of sand, and computing at speeds that are unattainable today even by covering tens of acres of floor space with clusters made from tens of thousands of the fastest processors built with current state of the art solid state technology. San Mallo, June 2004 158 Final remarks (cont’d) All we have at the time of this writing is a seven qubit quantum computer able to compute the prime factors of a small integer, 15. Building a quantum computer faces tremendous technological and theoretical challenges. At the same time, we witness a faster rate of progress in quantum information theory where applications of quantum cryptography seem ready for commercialization. Recently, a successful quantum key distribution experiment over a distance of some 100 km has been announced. San Mallo, June 2004 159 Summary Quantum computing and quantum information theory is truly an exciting field. It is too important to be left to the physicists alone…. San Mallo, June 2004 160